- About Trend Micro
- Newsroom
Newsroom
This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.
Jan 22, 2025
Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.
Jan 17, 2025
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data.
Jan 14, 2025
Pick your region:
Discover Trend Micro
The history, people, and values behind the company.
Connect with us